Showing 241 - 260 results of 360 for search '"ad hoc"', query time: 0.04s Refine Results
  1. 241

    Driver Distraction Identification with an Ensemble of Convolutional Neural Networks by Hesham M. Eraqi, Yehya Abouelnaga, Mohamed H. Saad, Mohamed N. Moustafa

    Published 2019-01-01
    “…Existing work of distracted driver detection is concerned with a small set of distractions (mostly, cell phone usage). Unreliable ad hoc methods are often used. In this paper, we present the first publicly available dataset for driver distraction identification with more distraction postures than existing alternatives. …”
    Get full text
    Article
  2. 242

    Transmission Power Control with the Guaranteed Communication Reliability in WSN by Dae-Young Kim, Zilong Jin, Jungwook Choi, Ben Lee, Jinsung Cho

    Published 2015-10-01
    “…In a wireless sensor network, sensor nodes are deployed in an ad hoc fashion and they deliver data packets using multihop transmission. …”
    Get full text
    Article
  3. 243

    Handover Management of Net-Drones for Future Internet Platforms by Kyung-Nam Park, Jin-Hyeok Kang, Byeong-Moon Cho, Kyung-Joon Park, Hwangnam Kim

    Published 2016-03-01
    “…In order to resolve the bandwidth issue, we can consider aerial networks by unmanned aerial vehicles (UAV) or the so-called drones for establishing a three-dimensional mobile network in an ad hoc manner. By deploying a network from the sky, we can use the otherwise idle wireless medium and high mobility free from ground obstacles. …”
    Get full text
    Article
  4. 244

    Towards a Standard Benchmarking Framework for Domain Adaptation in Intelligent Fault Diagnosis by Mohammed M. Farag

    Published 2025-01-01
    “…Existing studies often use ad-hoc evaluation methods with inconsistent dataset partitioning, labeling, and evaluation criteria. …”
    Get full text
    Article
  5. 245

    Evaluating network test scenarios for network simulators systems by Anis Zarrad, Izzat Alsmadi

    Published 2017-10-01
    “…A large-scale simulation model was implemented using ad hoc on-demand distance vector and destination-sequenced distance vector routing protocols to compare performance, correctness, and usability. …”
    Get full text
    Article
  6. 246

    An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application by You-Boo Jeon, Keun-Ho Lee, Doo-Soon Park, Chang-Sung Jeong

    Published 2013-11-01
    “…Intelligent vehicle section shows severe changes in position between vehicles and has numerous large scales of networks in its components; therefore, it is required to provide safety by exchanging information between vehicles equipped with wireless communication function via VANET (vehicular ad hoc network) and fixed apparatus at roadside regarding the status of road. …”
    Get full text
    Article
  7. 247

    GENOCIDNA NAMERA – ESENCIJA ZLOČINA GENOCIDA – problem interpretacije elemenata genocidne namere u postupku utvrđivanja zločina genocida – by Milan Palevic, Milan Rapajic

    Published 2020-04-01
    “…Neka tradicionalna rešenja sučeljena su sa novim koncepcijskim pristupima i dostupnom sudskom praksom, pre svega praksom dva ad hoc tribunala, kao i stavovima i mišljenjima sudija Međunarodnog suda pravde, datih povodom tri predmeta genocida koji su izneti pred njim. …”
    Get full text
    Article
  8. 248

    Russification and Russianization in Modern Historiography: Recent Developments and Future Directions by Nicholas W. Sessums

    Published 2025-01-01
    “…Instead, scholars now generally argue that policies were applied on a more ad hoc basis depending on the ethnic and national contexts of individual borderlands. …”
    Get full text
    Article
  9. 249

    A Linear Algebraic Framework for Dynamic Scheduling Over Memory-Equipped Quantum Networks by Paolo Fittipaldi, Anastasios Giovanidis, Frederic Grosshans

    Published 2024-01-01
    “…The policies are compared in terms of information availability, localization, and overall network performance through an ad hoc simulator that admits user-provided network topologies and scheduling policies in order to showcase the potential application of the provided tools to quantum network design.…”
    Get full text
    Article
  10. 250

    Conditions Affecting the Performance of Peripheral Vein Cannulation during Hospital Placement: A Case Study by Monika Ravik, Anton Havnes, Ida Torunn Bjørk

    Published 2017-01-01
    “…Data were collected in late 2012 using multiple data sources: semistructured interviews, ad hoc conversations, and video recordings. Video recordings of the two students’ cannula implementations were used to help clarify and validate the descriptions and to identify gaps between what students said and what they did. …”
    Get full text
    Article
  11. 251

    Tardive Dyskinesia, Oral Parafunction, and Implant-Supported Rehabilitation by S. Lumetti, G. Ghiacci, G. M. Macaluso, M. Amore, C. Galli, E. Calciolari, E. Manfredi

    Published 2016-01-01
    “…Implant failures were all in the maxilla and stopped when a rigid titanium structure was placed to connect implants. Ad hoc designed studies are desirable to elucidate the mutual influence between oral movement disorders and implant-supported rehabilitation.…”
    Get full text
    Article
  12. 252

    Relación entre desempeño innovador y madurez de capacidades de conocimiento y competencia by José Enrique Arias-Pérez, Germán Alfredo Schäfer-Elejalde, Carlos Andrés Aristizábal-Botero

    Published 2014-01-01
    “…En cuanto a lo metodológico, se aplicó un cuestionario y se elaboraron tablas de contingencia que describen la relación entre el desempeño innovador, sea inferior, similar o superior frente a la competencia, y la madurez de las capacidades de innovación, manifestada en tres niveles: Ad hoc y limitado, formalizado y predecible, e integración, sinergia y autonomía. …”
    Get full text
    Article
  13. 253

    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim

    Published 2020-01-01
    “…Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. …”
    Get full text
    Article
  14. 254

    Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs by Anitha Veerasamy, Srinivasa Rao Madane, K. Sivakumar, Audithan Sivaraman

    Published 2016-01-01
    “…Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. …”
    Get full text
    Article
  15. 255

    An Active Learning Approach with Uncertainty, Representativeness, and Diversity by Tianxu He, Shukui Zhang, Jie Xin, Pengpeng Zhao, Jian Wu, Xuefeng Xian, Chunhua Li, Zhiming Cui

    Published 2014-01-01
    “…Although several active learning algorithms have been proposed to combine the two criteria for query selection, they are usually ad hoc in finding unlabeled instances that are both informative and representative and fail to take the diversity of instances into account. …”
    Get full text
    Article
  16. 256

    Boost Full Bridge Bidirectional DC/DC Converter for Supervised Aeronautical Applications by Alberto Cavallo, Beniamino Guida, Luigi Rubino

    Published 2014-01-01
    “…Next, modulation schemes in both step-down and step-up modes are discussed. Successively ad hoc PI regulators for both operative modes are presented. …”
    Get full text
    Article
  17. 257

    Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System by Abhishek Joshi, Sarang Dhongdi, Rishabh Sethunathan, Pritish Nahar, K. R. Anupama

    Published 2017-01-01
    “…Wireless Sensor Network consists of large number of nodes densely deployed in ad hoc manner. Usually, most of the application areas of WSNs require two-dimensional (2D) topology. …”
    Get full text
    Article
  18. 258

    Vehicle location measurement method for radio-shadow area through iBeacon message by ChoonSung Nam, Dong-Ryeol Shin

    Published 2018-11-01
    “…To achieve this, we assume that vehicle-to-infrastructure communication is possible between a vehicle and roadside unit in Vehicular Ad hoc Networks. We used iBeacon at the roadside unit and revised its Universally Unique Identifier so that it generates absolute Global Positioning System location data; that is, moving vehicles can receive absolute Global Positioning System data from the roadside unit-based iBeacon. …”
    Get full text
    Article
  19. 259

    Logic-Based Security Architecture for Systems Providing Multihop Communication by Iman Almomani, Eman Al-Banna, Mousa AL-Akhras

    Published 2013-01-01
    “…Security is a basic element of distributed systems such as ad hoc and sensor communication networks. Several standards define security requirements and enforcers, such as ITU-T Recommendations X.800 and X.805. …”
    Get full text
    Article
  20. 260

    Survey on first-line therapeutic management of relapsing–remitting multiple sclerosis in clinical practice in Spain by M. Llaneza, G. Fontes, L. Benedito-Palos, E. Moral

    Published 2025-01-01
    “…Methods: Based on a review of the literature and the experience of a scientific committee made up by 2 neurologists, an ad hoc survey was developed and distributed to Spanish neurologists. …”
    Get full text
    Article